COMPSCI 725 Written
Report Archive |
|
|
|
|
|
|
The
following students have given permission for their written report to be
posted to this website. All other publication rights (including the
moral right of the author to be identified as such) are reserved. |
|
If
you were a student in COMPSCI 725, and you would like your written report to
be published here, please send email to cthombor@cs. |
|
|
|
|
|
|
Kristine |
Espanto |
2018 |
A Double Take on High Stakes: Exploring the Ethical
Conflict of Acquiring Informed Consent in Online Social Network
Research |
|
Yezhou |
Liu |
2018 |
An In-depth Discussion of Adversarial Image Generator (AIG)
in Real-life Scenarios |
|
Cameron |
McCarthy |
2018 |
Analysis of Fake Profiles for Research Purposes with Respect
to the IEEE Code of Ethics |
|
Brad |
Miller |
2018 |
Proposals for Holistic Security in Preventing Email Phishing
Attacks |
|
Callan |
Christophersen |
2017 |
A Brief Aetiology of
Computer System Security |
|
Jonas |
Debes |
2017 |
Evaluating Machine Learning Based Intrusion Detection
Techniques in a Real World Setting |
|
Albertus |
Mitton |
2017 |
Same-Origin Policy definition variations across different
problem contexts |
|
Vikram Jothinagara |
Prasanna Kumar |
2017 |
Honeynets as a possible defensive strategy for aiding
Artificial Intelligence Safety |
|
James |
Cooper |
2016 |
Subversive-C: How reasonable are the assumptions? |
|
Tao |
Yang |
2016 |
Improving Two-Factor Authentication Usability with
Sensor-Assisted Facial Recognition |
|
Gareth |
Sime |
2015 |
Using OpenID As An SSO Protocol |
|
Stuart |
Bradley |
2015 |
Realistic DNA De-anonymization using Phenotypic Prediction |
|
Anthony |
Wood |
2014 |
Cross-Domain Authentication and Authorisation in Pervasive
Computing Environments |
|
Ranran (Monica) |
Bian |
2013 |
Alice in Battlefield: An Evaluation of the Effectiveness of
Various UI Phishing Warnings |
|
Sam |
Kavanagh |
2013 |
Predictors of Social Networking Privacy Behaviour |
|
Arthur Joel |
Lewis |
2013 |
Control, Risk Awareness and Self-Disclosure: Factors
Influencing Online Privacy |
|
Tze Ching (Josephine) |
Lim |
2013 |
To what Extent does De-Anonymization of Mobile Datasets
Compromise Privacy? |
|
Mehul |
Raniga |
2013 |
Understanding the Gap between Usability and Security |
|
Rong |
Wang |
2013 |
Lab Study or Field Study: the Problems that Researchers Face
in Measuring the Effectiveness of Browser SSL Warning Designs |
|
David |
MacDonald |
2009 |
An Algorithmic Comparison of Location Privacy k-Anonymity
Systems |
|
Liam |
Fearnley |
2009 |
Square Root Laws of Steganographic Capacity in the Context
of Existing Models |
|
Mikhail |
Gouline |
2009 |
Relevance of Existing Taxonomies to Current Software
Watermarking Research |
|
Mark |
Spadafora |
2009 |
Discovering Campaign Based Spamming Strategies |
|
Han |
Zhong |
2009 |
Special Properties of Ad-hoc Wireless Network and Security
Models |
|
Sunny (Zhe) |
Sun |
2008 |
Using Two-factor Authentication Systems to Prevent Social
Phishing and Man-In-The-Browser Attacks for Internet Banking |
|
Rick (Fan) |
Zhang |
2008 |
An Analysis of the Online Banking Security Issues Reported
by Hole, Moen, and Tjostheim |
|
Han |
Zhong |
2008 |
The Vulnerabilities of IEEE 802.11 Wireless LANs (WLANs) |
|
Maxim |
Kharlamov |
2007 |
An Overview of RFID Security and Privacy Threats |
|
Lei |
Wei |
2007 |
Evaluation of Intrusion Detection Systems |
|
Tony |
Wu |
2007 |
Transparent System for E-mail Security |
|
Zhong Xia |
Ma |
2006 |
Insider Threats Assessment in the Real-World System |
|
Eugene Phan Hin |
Min |
2006 |
Biometrics: Application in Cryptographic Signatures |
|
Gavin Grant |
Neale |
2006 |
Investigating the Feasibility of Keyboard Acoustic Attacks |
|
Chi |
Yuen |
2006 |
A Framework for Legal Analysis of DRM Systems: Copyright and
Privacy |
|
Hong |
Zhou |
2006 |
Evaluation of Certificate Revocation in Microsoft
Information Rights Management v1.0 |
|
Fu'Ad W. F. |
Al Tabba' |
2005 |
Why Computer Security Fails - An Economic View |
|
Chang |
Chen |
2005 |
Recent Developments in Tracing Traitors |
|
Jiazhen |
Chen |
2005 |
Problems when running Untrusted Java threads and ways to
solve them |
|
Samantha J. |
Daniels |
2005 |
Insider Threats within the Financial and Movie Sectors: A
Comparative Study |
|
Daniel Ronald |
Flower |
2005 |
Threat Analysis of Emanation-Based Attacks |
|
Qian |
Gao |
2005 |
Misuse/Use Cases and Security Use Cases in Eliciting
Security Requirements |
|
Birgit |
Kaschte |
2005 |
Biometric authentication systems today and in the future |
|
Ron (Seong Min) |
Kim |
2005 |
Trusted Platform Module and Privacy: Promises and
Limitations |
|
Mu |
Li |
2005 |
Analysis of the Insider Attack Issue in the Movie, Banking,
and Computer Industries |
|
Man Fai |
Ma |
2005 |
How security requirements should be reused |
|
Bruce |
Megget |
2005 |
Assessment of Keyboard Acoustic Threats by Insiders |
|
Ahmed |
Mujuthaba |
2005 |
Towards a General Architecture for Secure Computing |
|
Gilbert |
Notoatmodjo |
2005 |
Detection of Self-Mutating Computer Viruses |
|
Mukul |
Pahwa |
2005 |
Digital Rights (Mis) Management |
|
Chun Wei (Johnny) |
Sia |
2005 |
Misuse Cases and Abuse Cases in Eliciting Security
Requirements |
|
Gene |
Tang |
2005 |
Trusted Computing: Addressing Insider Threats to the Banking
and Financial Sector |
|
Jens |
Trotzky |
2005 |
Analysis of turnitin.com |
|
Vanessa Wan Sze |
Tsang |
2005 |
Towards Analysis of Templates for Security Requirements |
|
Slobodan |
Vukanovic |
2005 |
Completeness, Versatility, and Practicality in Role-Based
Administration |
|
Amodha |
Wijekoon |
2005 |
Protecting against piracy: Building Tamper resistant
software |
|
Jesse |
Wu |
2005 |
Innocence of Traced Traitors |
|
Dong |
Zhang |
2005 |
Checking Primitives with Guards |
|
Miaomiao |
Zhang |
2005 |
What Should We Do about Self-plagiarism |
|
Mingfeng |
Bao |
2004 |
Improved data confidentiality: an overview of NGSCB |
|
Brendan
Sean |
Cervin |
2004 |
Review of Security Requirements Engineering Processes |
|
Michael
Alan |
Cochrane |
2004 |
VPN Access for mobile users: IPSec or SSL? |
|
Christopher |
John Mills |
2004 |
Investigation of Defences Against Cross Site Scripting
Attacks |
|
Siriwat |
Karndacharuk |
2004 |
Comparing Two Models of Distributed Denial of Service (DDoS)
Defences |
|
Corinne
Alison |
Lawrence |
2004 |
Intrusion Prevention Systems: The Future of Intrusion
Detection? |
|
Cho Hong |
Ling |
2004 |
Internet Firewall Vulnerability Analysis Method |
|
Zheng |
Liu |
2004 |
Microsoft .NET Passport, a solution of single sign on |
|
Zhengyuan |
Luo |
2004 |
Two SSO Architectures with a Single Set of Credentials |
|
Praveen |
Mandava |
2004 |
E-Voting (in)Security |
|
Paul
Richard |
Mason |
2004 |
An Intellectual Property Threat Analysis of a .NET Windows
Application |
|
Christian
Hagensen |
Mosveen |
2004 |
Why VPN Alone Will not Secure your Wireless Network |
|
Sandeep |
Mudana |
2004 |
Security Flaws in Internet Voting System |
|
Richard
Allen |
Paul |
2004 |
Verifying the Integrity of Shared Libraries |
|
Teng |
Teng |
2004 |
Analyzing the vulnerability of a certain Reputation-Based
Trust Management for P2P Networks |
|
Lei |
Wang |
2004 |
Fight against spyware on two laptops |
|
Yijie |
Yang |
2004 |
Raw Quick Pairs method of detecting Stego-images |
|
Cheung-Ling-Kelly |
Yu |
2004 |
A Case study on PKI: SERVE |
|
Bojan |
Zdrnja |
2004 |
Second-generation (GenII) honeypots |
|
Surender
Reddy |
Adavalli |
2003 |
Smart Card Solution: Highly secured Java Card Technology |
|
Sandeep |
Anand |
2003 |
Incorporating Biometrics and Smart Cards |
|
Kurt |
Bagby |
2003 |
Taking Computer Virus Detection to a New Level |
|
Matthew |
Barrett |
2003 |
Secure Multimedia Content Delivery to the Home via the
Internet |
|
Diana |
Butters |
2003 |
Comparison of Matching Algorithm Used in Three Plagiarism
Detection Systems |
|
Anupam |
Dewan |
2003 |
Enhancing Biometric Authentication with Data Protection |
|
Gopi |
Dinakaran |
2003 |
Fail-Stop Signature Scheme for Digital Payment |
|
Yuman |
Huang |
2003 |
Safeguarding a Native XML Database System |
|
Sasank |
Jampana |
2003 |
Semantic Watermarking of Plain Text |
|
Adam |
Johnson |
2003 |
Protecting Free Speech using the Eternity Service |
|
Gareth |
Karl |
2003 |
A Probabilistic Trust Model |
|
Sau Fan |
Lee |
2003 |
Analysis on Some Defences against SYN-Flood Based
Denial-of-Service Attacks |
|
Qiang |
Liu |
2003 |
Techniques Using Exterior Component Against Software Piracy |
|
Qing-Shan
Martin |
Lun |
2003 |
A Survey of Three Proposed Techniques to Increase the
Security of Java |
|
Sidney |
Markowitz |
2003 |
User and Process Identity in Access Control |
|
Akhil |
Mehra |
2003 |
Methods of Securing the Bootstrap Process of an Operating
System |
|
ChaoLi |
Ou |
2003 |
Text Watermarking for Text Document Copyright Protection |
|
Po-yuan |
Peng |
2003 |
Intrusion Detection System at Operating System Level |
|
Iain |
Phillips |
2003 |
Hardware-Based Methods for Prevention of Multimedia Piracy:
Some Issues |
|
Jerrold |
Poh |
2003 |
Managing Trust: Real World Examples |
|
Franz |
Rambach |
2003 |
Taxonomies of Attackers |
|
Paul |
Shotbolt |
2003 |
Several Compromising-Emanations Based Interception
Techniques and Their Implications |
|
Mike |
Stay |
2003 |
Cards vs. Shuffling |
|
Ji |
Sun |
2003 |
Is Decimalisation Table Attack Really a Major Threat? |
|
Aditya |
Vutukuri |
2003 |
Frequent Denial of Service Attacks |
|
Lixin |
Wang |
2003 |
Artificial Neural Network for Anomaly Intrusion Detection |
|
William |
Xie |
2003 |
Smart Card and its Application in Software Protection |
|
Xiaodong |
Yang |
2003 |
Protecting Mobile Agent against Malicious Hosts Using A
Time-Limited Blackbox Approach |
|
Hong Lei |
Zhang |
2003 |
Three attacks in SSL protocol and their solutions |
|
Lixi |
Chen |
2002 |
Code Obfuscation Techniques for Software Protection |
|
Xiaoyu |
Chen |
2002 |
Privacy Protection in Digital Rights Management Systems |
|
Gareth
George |
Cronin |
2002 |
A Taxonomy of Methods for Software Piracy Prevention |
|
Weiguo |
Jin |
2002 |
Applying Epidemiology in Computer Virus Prevention:
Prospects and Limitations |
|
Haiying |
Tan |
2002 |
Authentication in mobile-agent system: D'Agents |
|
Stefan
Anders |
Thoren |
2002 |
Case Study: Applying common software security guidelines to
improve program robustness |
|
Michael
Chun Long |
Yip |
2002 |
Spyware: Tracking of Information, Counteraction, and Legal
Implications |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|